27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 1.2.6 or higher.<br />

CVE-2005-2193<br />

SSH Valid Banner Check<br />

<strong>PVS</strong> ID: 3059 FAMILY: SSH RISK: INFO NESSUS ID:Not Available<br />

Description: Ensure some level of integrity for the SSH banners being presented.<br />

Solution: N/A<br />

CVE Not available<br />

Bugzilla < 2.18.2 / 2.20rc1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3060 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18654<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw in the way that it discloses private<br />

information.\n\nThe remote host is running Bugzilla, a bug-tracking software with a web<br />

interface. This version of Bugzilla on the remote host suffers from two information<br />

disclosure vulnerabilities:\n\n - Any user can change any flag on a bug, even if they don't<br />

otherwise have access to the bug or rights to make changes to it.\n\n - A private bug<br />

summary may be visible to users if MySQL replication is used on the backend database.<br />

Solution: Upgrade to Bugzilla 2.18.2 / 2.20rc1 or higher.<br />

CVE Not available<br />

PPA functions.inc.php ppa_root_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3061 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running PPA, a photo album application written in PHP.\nThere is a flaw in the remote<br />

version of this software that may allow an attacker to force the remote PHP script to<br />

include arbitrary files hosted on a third-party server. Therefore, an attacker can exploit this<br />

flaw to execute arbitrary PHP code on the remote host.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2199<br />

Outlook Express Multiple DoS<br />

<strong>PVS</strong> ID: 3062 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18680<br />

Family Internet Services 782

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!